Facet browsing currently unavailable
Page 3 of 933 results
Sort by: relevance publication year
A formal modeling and analysis approach for access control rules, policies, and their combinations JOURNAL ARTICLE published February 2017 in International Journal of Information Security |
An online intrusion detection method for industrial control systems based on extended belief rule base JOURNAL ARTICLE published 26 April 2024 in International Journal of Information Security Research funded by Postdoctoral Science Foundation of China (No. 2020M683736) | Teaching Reform Project of Higher Education in Heilongjiang Province (No. SJGY20210456) | Natural Science Foundation of Heilongjiang Province of China (No. LH2021F038) | Social Science Foundation of Heilongjiang Province of China (No. 21GLC189) | Foreign Expert Projects in Heilongjiang (No. GZ20220131) |
Defense against membership inference attack in graph neural networks through graph perturbation JOURNAL ARTICLE published April 2023 in International Journal of Information Security |
Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards JOURNAL ARTICLE published 14 March 2024 in International Journal of Information Security |
TermID: a distributed swarm intelligence-based approach for wireless intrusion detection JOURNAL ARTICLE published August 2017 in International Journal of Information Security |
Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results JOURNAL ARTICLE published November 2013 in International Journal of Information Security |
Anonymity in traceable cloud data broadcast system with simultaneous individual messaging JOURNAL ARTICLE published June 2021 in International Journal of Information Security Research funded by University Grants Commission (F1-17.1/2014-15/RGNF-2014-15-SC-WES-58080/(SA-III/Website)) |
Less is more: relaxed yet composable security notions for key exchange JOURNAL ARTICLE published August 2013 in International Journal of Information Security |
Two-party generation of DSA signatures JOURNAL ARTICLE published August 2004 in International Journal of Information Security |
Implementing public-key cryptography on passive RFID tags is practical JOURNAL ARTICLE published February 2015 in International Journal of Information Security |
Perfect secrecy systems immune to spoofing attacks JOURNAL ARTICLE published August 2012 in International Journal of Information Security |
Gossamer: weaknesses and performance JOURNAL ARTICLE published June 2022 in International Journal of Information Security |
Portfolio optimization of computer and mobile botnets JOURNAL ARTICLE published February 2014 in International Journal of Information Security |
Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts JOURNAL ARTICLE published August 2018 in International Journal of Information Security |
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol JOURNAL ARTICLE published November 2016 in International Journal of Information Security Research funded by German Research Foundation (DFG) (Fi 940/3-1, Fi 940/3-2) | German Federal Ministry of Education and Research (BMBF) (EC SPRIDE,EC SPRIDE) | German Research Foundation (DFG) (CRC 1119,CRC 1119) | Hessian LOEWE excellence initiaive (CASED,CASED) | Engineering and Physical Sciences Research Council (EPSRC) (EP/H005455/1,EP/H005455/1) |
Value-utilized taint propagation: toward precise detection of apps’ information flows across Android API calls JOURNAL ARTICLE published October 2022 in International Journal of Information Security |
Efficient verifiable computation over quotient polynomial rings JOURNAL ARTICLE published October 2022 in International Journal of Information Security Research funded by Institute for Information and Communications Technology Promotion (20210007270012002,20210007270012002) |
Instruction-level security typing by abstract interpretation JOURNAL ARTICLE published March 2007 in International Journal of Information Security |
A methodology to measure and monitor level of operational effectiveness of a CSOC JOURNAL ARTICLE published April 2018 in International Journal of Information Security Research funded by Army Research Office (W911NF-13-1-0421 and W911NF-15-1-0576) | Office of Naval Research (N00014-15-1-2007) |
How to obtain full privacy in auctions JOURNAL ARTICLE published October 2006 in International Journal of Information Security |